Security



Blocking and preventing brute force attacks is one of the main things you want to do on your web server to add a layer of security. While someone might not be targeting your site or server specifically, they will have automated tools that will try to guess random usernames and passwords that are common against your system. They’re essentially forcing their way to user only authorized area’s of a system, such as FTP accounts, e-mail accounts, databases, script based administration areas and root or any shell access are most common attempts.
 They will try multiple login attempts, guessing usernames and passwords, trying to force their way onto your machine, This is a large topic with a lot of things to cover, I’ll try to do my best to help you understand how brute force attacks work, prevention, signs of an attack, and tools to help stop brute force attacks, This article will not cover session brute force attempts for web applications, in a future article I’ll cover that but for now we’re looking at main service daemons such as ftp and shell.


How the brute force attack works
Read more..
Your rating: None Average: 1 (1 vote)

So many people are getting their own dedicated servers but are completely clueless about security. Usually they leave it up to the company where they purchase it or hire someone. That's fine but make sure you have these 10 items covered.



Use a Firewall

Read more..
Your rating: None Average: 3 (2 votes)

How to crack things like FTP/SSH/POP3 etc. Well, here is a quick way to do this for all you Windows users out there, provided you have a decent sized password dictionary. I personally use one of about 3.16GB in size, but for this tutorial I'm only going to use a small password list, just so you get the feel of it. First step, download hydra either from it's homepage ([url="http://freeworld.thc.org/thc-hydra%29,as"]http://freeworld.thc.org/thc-hydra),as[/url] that's what this tutorial is written for. Download the zip file, extract it, and make sure you see the files below

Image

If you do, that's good. Go to Start > Run > cmd to open the command prompt. Then change to your hydra folder using the “cd” command. For example my hydra folder was on the desktop, so I did this

ImageRead more..

Your rating: None Average: 3.2 (9 votes)

This video tutorial teaches you how you can crack a window vista password.
Due to the lack of LM hashes, Vista passwords stored in the SAM file are harder to crack. However, the NTLM hash is the same as always and can be cracked if the password is weak.
Warning:for home use only
Your rating: None Average: 3.7 (3 votes)

       Address resolution protocol or ARP is a protocol that is used to get the hardware address (MAC) of a device on the network with its IP address (Network Layer). RARP does the opposite of ARP; it will look up the IP address with the MAC address. RARP works a little differently, it will send out a broadcast asking who has the MAC address, a RARP server will then respond with the nodes IP address. ARP is commonly used in Ethernet networks but can also be used in other types of networks. Ipv6 doesn’t use ARP, but rather NDP (Network Discovery Protocol). In order for Ethernet to send data it needs the MAC address of the receiving device.

A MAC address uniquely identifies a device on the network and is in the Data Link level (level 2) of the OSI model. These MAC addresses are burned into the network card by the manufacture and are should be the only one in the world. The first 6 digits of the MAC address is assigned to the network interface card is the manufacture ID and the last 6 is the cards serial number. You can change your MAC at the software level (it wont change the burned in MAC address on the NIC) fairly easily. Read more..
Your rating: None Average: 3 (2 votes)

If your company is like most companies, you have users running as local administrators on their desktop. There are solutions to eliminate this need, which is a direction every company should make. When users run as local administrators, the IT staff has no control over that user or their desktop. In order for you to secure the local Administrators group on every desktop, you need to have some powerful tools to get the job done. There are typically three different tasks that you need to perform to secure this group, which we will cover in this article. Windows Server 2008 and Windows Vista SP1 (with the RSAT installed) provide amazing new controls that make these configurations a breeze!

Task 1 - Remove Domain User Account


The initial task of securing the local Administrators group is to ensure that the user no longer has membership in the group. This is easier said than done, since most companies have configured the user’s domain account to have membership in this group at installation of the user’s computer. Read more..

Your rating: None Average: 3 (2 votes)

Search

Loading

Sponsered links

Bookmark Us!

Share/Save

Page Rank

Quotes

A fundamental rule in technology says that whatever can be done will be done.

Explore Tags

Follow Us